• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

DOJ takes action against 22-year-old running RapperBot Botnet

 | 

Google fixed Chrome flaw found by Big Sleep AI

 | 

Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack

 | 

A hacker tied to Yemen Cyber Army gets 20 months in prison

 | 

Exploit weaponizes SAP NetWeaver bugs for full system compromise

 | 

Allianz Life security breach impacted 1.1 million customers

 | 

U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog

 | 

AI for Cybersecurity: Building Trust in Your Workflows

 | 

Taiwan Web Infrastructure targeted by APT UAT-7237 with custom toolset

 | 

New NFC-Driven Android Trojan PhantomCard targets Brazilian bank customers

 | 

Cisco fixed maximum-severity security flaw in Secure Firewall Management Center

 | 

'Blue Locker' Ransomware Targeting Oil & Gas Sector in Pakistan

 | 

Hackers exploit Microsoft flaw to breach Canada ’s House of Commons

 | 

Norway confirms dam intrusion by Pro-Russian hackers

 | 

Zoom patches critical Windows flaw allowing privilege escalation

 | 

Manpower data breach impacted 144,180 individuals

 | 

U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical FortiSIEM flaw under active exploitation, Fortinet warns

 | 

Charon Ransomware targets Middle East with APT attack methods

 | 

Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Expert revealed how to hack professional drones used also by police

Expert revealed how to hack professional drones used also by police

Pierluigi Paganini March 05, 2016

An expert presented his study on hijacking high-end drones commonly deployed by government and law enforcement agencies.

The researcher Nils Rodday presented at the annual RSA conference in San Francisco the findings of its study on hacking drones.

Rodday, who currently at IBM, has conducted his research while working as a graduate researcher at the University of Twente in the Netherlands.

Rodday focused its research on remote hijacking high-end drones commonly deployed by government agencies and law enforcement agencies. The expert explained how to exploit security holes in the drone’s radio connection to gain control on the UAV, an attack that just need a laptop and a cheap USB-connected chip.

The expert hasn’t provided details on the specific drone model he has tested because he signed a non-disclosure agreement with its manufacturer of the UAV.

Rodday has found a way to exploit the lack of encryption for the communication between the drone and controller module. A rogue hacker can make a reverse engineering of the drones software components in order to discover which are command accepted by the UAV and send them to the navigation controls. block all commands from the real operator, or even crash it to the ground.

Parrot Bebop drones

In a typical attack scenario, the hacker can isolate the drone from the controller, blocking all commands from the legitimate operator, send its commands resulting in drone hijacking.

“If you think as an attacker, someone could do this only for fun, or also to cause harm or to make a mess out of a daily surveillance procedure,” Rodday told Wired. “You can send a command to the camera, to turn it to the wrong side so they don’t receive the desired information… or you can steal the drone, all the equipment attached to it, and its information.”

Rodday discovered two critical security vulnerabilities in the tested unmanned aerial vehicle (UAV), such as the poorly encrypted Wi-Fi connections that open the vehicle to cyber attacks and makes it ‘crackable in seconds’.

The security issues reside in a communication chip, the Xbee, that doesn’t implement strong encryption between the unmanned aerial device and the controller module ( ‘telemetry box’), opening to man-in-the-middle (MitM) attack.

An attacker could intercept the traffic between the drone and the telemetry box injecting impersonating the legitimate control operator.

Rodday explained that the drone he tested is used by the Dutch police for surveillance, the cost of the UAV is around €20,000 ($21,700). The model of drone tested by the expert is used in many other industries, including agriculture and protection of critical infrastructure.

The most worrying part of the research is the scope of the discoveries made by Rodday, many other drones on the market could be affected by the same vulnerabilities.

“I think this vulnerability exists in a lot of other set-ups. The impact of the whole thing is bigger than this manufacturer,” he explained.

“Due to the fact that multiple UAV manufacturers are using the investigated technology, the impact of this research is high. This research will be shared with the manufacturers who are known to implement the investigated solutions and made publicly available.” wrote the expert.

“There are presumably many more manufacturers using the vulnerable setup without revealing their hardware components to the public, leaving their setup prone to attacks. To encounter this issue, security awareness within the community of UAV manufacturers is important.”

I suggest you to read the interesting thesis published by Rodday on the topic.

“Although the costs for professional UAVs are extensively higher compared to consumer UAVs, the security of the investigated model can be judged insufficient.” wrote Rodday.

“It was possible to perform a MitM attack on the XBee communication channel. As no encryption and authentication are applied anywhere, packets were successfully injected into the compromised channel, making the UAV react to the attacker’s commands.” 

Pierluigi Paganini

(Security Affairs – hacking drones, hijacking)


facebook linkedin twitter

drone hacking encryption Hijacking RSAC2016 UAVs

you might also like

Pierluigi Paganini August 20, 2025
DOJ takes action against 22-year-old running RapperBot Botnet
Read more
Pierluigi Paganini August 20, 2025
Google fixed Chrome flaw found by Big Sleep AI
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    DOJ takes action against 22-year-old running RapperBot Botnet

    Cyber Crime / August 20, 2025

    Google fixed Chrome flaw found by Big Sleep AI

    Security / August 20, 2025

    Pharmaceutical firm Inotiv discloses ransomware attack. Qilin group claims responsibility for the hack

    Data Breach / August 20, 2025

    A hacker tied to Yemen Cyber Army gets 20 months in prison

    Cyber Crime / August 20, 2025

    Exploit weaponizes SAP NetWeaver bugs for full system compromise

    Security / August 20, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT